Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our User Agreement and Privacy Policy.

Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our Privacy Policy and User Agreement for details.

Cloud Computing

2.
Introduction Cloud Computing Industry is growing  According to Gartner, worldwide cloud services revenue is on pace to surpass $56.3 billion in 2009, a 21.3% increase from 2008 revenue of $46.4 billion, according to Gartner, Inc. The market is expected to reach $150.1 billion in 2013. Businesses are increasing Cloud adoption  "We expect a great deal of migration towards cloud computing within the federal government in addition to the already robust private sector growth. The growth of the cloud should not outpace our ability to protect the data that goes into it..." ~ FormerWhite House advisor Paul Kurtz, partner with Good Harbor Consulting, LLC How can IT leaders ensure security in the cloud?IWillStudy Cloud Summit Ahmedabad

6.
And in a non-Cloud view, there are inefficiencies in addressing those issues Allocated Load IT-capacities Forecast “Under-supply“ of capacities IT CAPACITY “Waste“ of Fixed cost of capacities IT-capacities Barrier forinnovations Actual Load TIME

7.
However, in a Cloud View Load Allocated IT Forecast capacities No “under-supply“ IT CAPACITY Reduction of Possible “over-supply“ reduction of IT-capacities in case of Reduction reduced load of initialinvestments Actual Load Time

26.
Setting up EC2 account and tools Create a new keypair (allows cluster login)  ec2-add-keypair <group>-keypair | grep –v KEYPAIR > ~/.ec2/id_rsa-<group>- keypair  chmod 600 ~/.ec2/id_rsa-<group>-keypair  Only do this once! It will create a new keypair in AWS every time you run it  Share private key file between group members, keep it private  Don’t delete other groups’ keypairs!  Everyone has access to everyone else’s keypairs from the AWS console  EC2 tab ->Network and Security -> Keypairs Troubleshooting  http://docs.amazonwebservices.com/AmazonEC2/gsg/2007-01-03/

27.
CleanupTerminate your clusters when you’re done! They cost <personX> grant money ($1/hour for a full cluster of 9 nodes) You can always create more later hadoop-ec2 terminate <group>-cluster They can also be terminated manually from the AWS->EC2 console